Abstract
Cloud computing provides blockchain a flexible and cost-effective service by on-demand resource sharing, which also introduces additional security risks. Adaptive Cyber Defense (ACD) provides a solution that continuously changes the attack surface according to the cloud environments. The dynamic characteristics of ACDs give defenders a tactical advantage against threats. However, when assessing the effectiveness of ACDs, the structure of traditional security evaluation methods becomes unstable, especially when combining multiple ACD techniques. Therefore, there is still a lack of standard methods to quantitatively evaluate the effectiveness of ACDs. In this paper, we conducted a thorough evaluation with a hierarchical model named SPM. The proposed model is made up of three layers integrating Stochastic Reward net (SRN), Poisson process, and Martingale theory incorporated in the Markov chain. SPM provides two main advantages: (1) it allows explicit quantification of the security with a straightforward computation; (2) it helps obtain the effectiveness metrics of interest. Moreover, the hierarchical architecture of SPM allows each layer to be used independently to evaluate the effectiveness of each adopted ACD method. The simulation results show that SPM is efficient in evaluating various ACDs and the synergy effect of their combination, which thus helps improve the system configuration accordingly.
Funder
Guangdong Province Research and Development Key Program
Guangdong Basic and Applied Basic Research Foundation
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference68 articles.
1. Blockstack: A Global Naming and Storage System Secured by Blockchains;Ali;Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference,2016
2. Comments on “A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud”
3. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
4. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats;Jajodia,2011
5. A Framework for Mimic Defense System in Cyberspace